ANALYSIS AND IMPLEMENTATION OF OPERATIONAL SECURITY MANAGEMENT ON COMPUTER CENTER AT THE UNIVERSITY X

Size: px
Start display at page:

Download "ANALYSIS AND IMPLEMENTATION OF OPERATIONAL SECURITY MANAGEMENT ON COMPUTER CENTER AT THE UNIVERSITY X"

Transcription

1 ANALYSIS AND IMPLEMENTATION OF OPERATIONAL SECURITY MANAGEMENT ON COMPUTER CENTER AT THE UNIVERSITY X Ibnu Gunawan, Agustinus Noertjahyana and Hartanto Rusli Department of Informatics Engineering, Faculty of Industrial Technology, Petra Christian University, Surabaya, Indonesia ibnu@petra.ac.id ABSTRACT This paper presents how to asses an Operational Security Management on Computer Center at the University X. In carrying out operations using information technology-based computer network, it is an organization needs to consider factors in information systems security. The Security of communication networks is absolutely necessary to be able to provide continuous service to its users. Most of the staff was involved in the making of this security policy, often feel confused in starting to work, due to not having enough experience or feeling that it will not require a policy because there was no incident related to a security policy. To resolve these problems, we need a tool to help the staff in making the security system design that is structured with implementation modules sourced from security policy and risk management module so that it can be monitored if an error occurs. In last section, this paper show how to testing by using the engine to perform the questionnaire calculations, making planning and operations. Occurs similarity between the results of risk management high risk states with a CISSP standard studied on a case study. Keywords: CISSP, security, planning and operational. INTRODUCTION In carrying out operations based on information technology, especially with the use of a computer network infrastructure, organizations not only need to make a good information system, but also need to consider the safety factor as one of the supporting information systems are reliable. Secure communications network is absolutely necessary to keep the organization in order to always be able to provide continuous service to its members. The need for this security system needs to be clearly defined and may ultimately be implemented in practice to be able to support operations in an organization's information systems. By applying the appropriate procedures for each activity, it is expected to be able to judge the right to security needs in accordance with what is required by the organization (Danchev, 2013). To be able to build a security policy that provides a good foundation in the future, then the first step that must be developed is to create a security policy that can reduce the risk of misuse of the resources available in the organization. Most of the staff were involved in the making of this security policy, often feel confused in the start of manufacture, because did not have enough experience or feeling not require a security policy because there was no incident related to a security policy. This paper will show how to asses an Operational Security Management on Computer Center At the University X by applying risk management with CISSP knowledge to the operational security management on computer center at the university x. RISK MANAGEMENT Risk management is a combination of the three processes (Stoneburner, 2013), namely: Risk Assessment, Risk Mitigation and evaluation. a) Risk Assessment The steps to perform risk analysis is as follows (Stoneburner, 2013): System Characterization Threat Identification Vulnerability Identification Control Analysis Likelihood Determination Impact Analysis Risk Determination Control Recommendations Results Documentation b) Risk Mitigation Good strategy to perform risk mitigation can be seen in Figure-1 (Stoneburner, 2013). Figure-1. Risk mitigtion strategy (Stoneburner, 2013). c) Risk Evaluation and Control For the implementation of controls to prevent possible risks, organizations need to think about both the 1688

2 process control technically, management and operations, or do a combination of more than one control that aims to further streamline the process control of IT systems in the organization. Technical Control Technical controls can be grouped into 4 main categories like Figure-2 Management Security Control Operations Security Control CISSP CISSP (Certified Information System Security Professional) is a certification in the field of information security. (Conrad, 2010) In accordance with current global progress, the need for security and development in the field of technology continues to evolve. Safety first is a hot issue in the technology alone, but now has become part of our lives everyday. Security noticed by any organization, government agencies, companies, and even military units. CISSP itself divides the definition of security in 10 areas called with 10 domains. 10 domains are considered to include all the parts of a computer, network, business, and security information. 10 domains in the CISSP are as follows: 1. Domain 1: Information Security Governance and Risk Management 2. Domain 2: Access control 3. Domain 3: Cryptography 4. Domain 4: Physical (Environmental) Security 5. Domain 5: Security Architecture and Design 6. Domain 6: Bussiness Continuity and Disaster Recovery Plan 7. Domain 7: Telecommunications and Network Security 8. Domain 8: Application Development Security 9. Domain 9: Operations Security 10.Domain 10: Legal, Regulations, Investigation, and Compliance REQUIREMENT ANALYSIS University X is currently growing more rapidly with a mission of IT - based campus" which means to use information technology more prevalent not only among faculty, staff, and staff but also the students who are in it. For example, for a staffing system that uses a special application, the system input value for each lecturer can enter grades online, academic system that provides registration services online student study plans, as well as other support systems. With these examples can be seen more and more systems started there and where any employee or student to use the same code for each system, so in this case required a security policy. Given the problems it is necessary to do an analysis of the risk to the risk that information technology can impact the operations of University X. Through risk analysis, especially the university computer center which was subjected to more easily we can know the risks of what could happen, measure how big the risk is, and how its impact, and get the results of risk calculations Which is of particular concern to the risk that is not a priority special. Of the subject has been mentioned that the central computer can handle all the problems that exist and also take the policy from the calculation of risk that has been done. Thus the security system central computer can be safe and well monitored. The most difficult thing to do is mapping CISSP standard to risk management standard in order to create a questionnaire for capturing the truly characteristic of existing policy on university computer center x (Miller, 2012) Figure-2. Technical control (Stoneburner, 2013). RISK ANALYSIS Here is an example of questioner resulted of mapping questioner CISSP standards and risk management that we do to some of the existing policy on university computer center x divided by user and system owner: User Questioner sample: a. Access Control Questioner: 1. how often do you change your password? a. Once a month b. 3 months c. once a year d. never b. Security Architecture and Design Questioner: 11. According to you, what qualities (specs) provided computer by computer center? a. Is sufficient b. mediocre c. less worthy. c. Physical and Environmental Security Questioner: 15. How do you think about the environment control such as the placement of electrical wiring, placement of personnel, and fire safety? a. Less well b. pretty good c. very good 1689

3 d. Telecommunications and Network Security Questioner: 20. Did you know the IP address version 6? a. Yes b. not e. Cryptography Questioner: 30. Was your password consists of a combination of small capital letters, containing numbers, and other requirements? a. Yes b. not f. Business Continuity and Disaster Recovery Planning Questioner: 32. The event of a power failure during the learning process, if there is such a power generator to power the lights back on? a. Yes b. not g. Legal, Regulations, Investigations, and Compliance Questioner: 35. Did you ever take advantage of the software license provided by the Computer Center as a CD-Key of Windows and other applications? a. Yes b. not h. Software Development Security Questioner: 39. How does the quality of the software provided by the Computer Center? (if often error) a. Excellent b. Fine, rare error c. Poor, often an error i. Operations Security Questioner: 41. How often do you see drivers (hard drive, flash) after accessing your computer infected with viruses at University X? a. Often b. Rarely c. never Owner Questioner sample: (a) Access Control Questioner: 6. How many times authentication error tolerance limits owned by the user? a. 3 times b. 5 times c. 10 times d. no restrictions a. Ever,... times b. Never c. Do not know (e) Cryptography Questioner: 37. Is there a standard encryption method to be applied to the document storage? a. Yes b. Not c. Do not know (f) Business Continuity and Disaster Recovery Planning Questioner: 39. Are there certain parts that perform the steps Bussiness Impact Analysis (BIA) in the event of an accident? a. Yes b. Not c. Do not know (g) Legal, Regulations, Investigations, and Compliance Questioner: 52. Was used software are protected from SQL Injection? a. Yes b. Not c. Do not know (h) Software Development Security Questioner: 62. Was meeting minutes in a paper shredder if it is not used? a. Yes b. Not c. Do not know And the some of the result can be seen on Figure-3. SYSTEM DESIGN We will describe from system analysis to system design: i. System analysis For the purpose of obtaining information necessary for the design of security systems, need to be made questionnaire addressed to the user or population. Making questionnaires starting the login process, if entered as a guest it can only work on the questionnaire. If entered as admin then can create a project in which there is a menu -making questionnaire. (b) Security Architecture and Design Questioner: 11. Is there a certain standard of maintenance of the computers used in the Computer Center Petra? a. There,... b. Not c. Do not know (c) Physical and Environmental Security Questioner: 16. How often the air conditioner (AC) to the central computer room or server room in the service? a. 1 month b. 3 months c. 1 year d. never (d) Telecommunications and Network Security Questioner: 29. Was there ever a network connection at the University experience down? Figure-3. Example risk analysis questioner result. Project data will be stored into the database and the admin can continue on making the questionnaire. After that, the admin can create problems questionnaire and each 1690

4 question will be saved in the database after stored, will directly Replaces zoom with Javascript using Ajax. Having had enough to make the necessary questionnaire questions, the admin can publish that question to be accessed and filled out by the user. Then after the user has filled out a questionnaire with a sufficient amount, then the application will make the process of scoring and the score will be recorded in the database. The results of the scoring will be continued on the risk analysis process to find the priority, then the priority will be known by the admin and can continue on the planning process. In the planning process, the system will mendapatkankan priority data are consistent with the risk management process and entered into the database. Once the domain sorted by priority which is more important. From the results that the user can view the guidelines to do to design a security system based on standard CISSP and will proceed to the operational process. At the operational processes, the admin can review the selected design in the planning process in accordance with the planning months on submit. In operation page can print the report. To provide a login feature, create project, view the questionnaire, the questionnaire publish, view answers to questionnaires, planning, and operational then built a system which consists of four components, namely, PHP, Web Services, Javascript, and database servers. In PHP component, there is the user interface for loggings, manufacture of a new project, view project, questionnaire development, view the questionnaire, and publish the questionnaire. To perform these features, the web service is needed in order to display the project data and questionnaire data. The data obtained from the database server component. That is a MySQL database that is stored on the server. Access to the database is done by the web service components then the data is displayed every time the user accesses the page questionnaire project or appearance. To be able to perform the create, view, update, and delete the database required admin privileges (Dubois 2013). Admin add project edit project delete project <<include>> <<include>> <<include>> Figure-4. Use case diagram on page project admin. A system design using Use Case Diagram and Activity Diagram is used to model the behaviors of users at once describe a work flow system and the system components. For more detail example, please see Figure-4. After we compose an use case diagram, next we move to the activity diagram. For a single example, please see Figure-5. SYSTEM IMPLEMENTATION This section will explain the implementation of the interface and implementation of an application system that has been created. In order for the program to run properly, you should perform the installation on the computer prior to use. Software necessary for the program to run properly is to use notepad + + and XAMPP localhost server. In making this application requires a connection using localhost as quickly as do the development and testing of applications. The process of making a software application in the project will use the PHP language with the help of Javascript and Ajax to make the user interface more attractive. For database management, using PhpMyAdmin. Login ii. System design In general, the application is made is divided into two parts, namely the design of the system admin and Guest. In the design of the admin and guest system will be described by using use case and activity diagrams (Gomaa, 2011). a. admin system design In the admin system design is necessary to design a system design to fit the needs. Figure-5. Activity diagram admin edit project. 1691

5 And then we can build an entity relationship diagram like showed on Figure-6 on the next page. After we build our database then we can move on to design our application user interface. We showed one of them on Figure-7. the questionnaire to preparing operational reports. As for the types of tests performed, among others: Tests on the calculation of the questionnaire. Tests on the planning results. Testing of operational reports. Tests on the results of standardized management CISSP. Tests on the calculation of the questionnaire In the software will do the calculations testing the questionnaire as an administrator and the steps needed to achieve calculation of the questionnaire? To achieve the calculation of the questionnaire, the user needs to do: Figure-7. UI design. We use standard library has been used by many programmers in the world to make a good web application and accompanied by supporting the use of other libraries. Some libraries used in the application of this thesis include: Ajax, which is used to make the user interface more attractive to look at. Jquery-ui, which is used to make the look fresher and more colorful. for example source code we can see on Figure-8. SYSTEM TESTING This section will describe the results of the testing of the software to evaluate the results of the calculation of a) Perform login as we can see on Figure-9 b) Creating a project as we can see on Figure-10 c) Creating a questionnaire as we can see on Figure-11 d) Publishing the questionnaire as we can see on Figure- 12 e) Seeing the results of the percentage of responses to questionnaires as we can see on Figure-13. Tests on the planning results Tests conducted on the parameter selection of standard CISSP per domain, the addition of a custom planning, and manufacturing planning. Testing begins from planning to go to the admin page. Planning page aims to provide a security administrator is not standard raw CISSP Security Administrator to assist in the making of a good security system. This planning page gets the input data is a result of risk management priorities and made the accordion and classification based on per domain CISSP. For the result we can see on Figures 14, 15, and

6 Planning_Id Date Planning_Result Username Password Date & Time Login Variable characters (50) Variable characters (50) Mempengaruhi Project_id Project_Name Questionnaire_Title Published Project Variable characters (50) Variable characters (100) (D) Question_Detail_ID Choice Choice_Type Explanation Score Question_Detail Memiliki Variable characters (100) Question_id Question Order weight Suggestion Identifier_2 Question Variable characters (300) Variable characters (1000) Answer Memiliki Answer_Id Date Score Date & Time memiliki mendapat Priority_Result Priority Menggolongkan Plaaning_Result_Detail Checked Question_Answer_Id Number Question AnswerType Score Question_Answer <Undefined> Variable characters (300) Mengelompokkan Choice_Type Choice Explanation Score Marked Explanation_Answer Question_Answer_Detail Variable characters (100) Variable characters (100) Domain_Table Domain_Id Domain_Name Variable characters (100) Description Variable characters (500) melihat Suggestion_Id Suggestion Risk Order Domain_Suggestion Variable characters (1000) Variable characters (500) Mengacu mengelompokkan Custom_Detail_Result_Id Suggestion Custom_Planning_Result_Detail Variable characters (1000) Figure-6. E-R diagram. tergolong Figure-8. Example source code. Figure-9. Perform login. 1693

7 Figure-10. Creating a project. Figure-13. Percentage result. Figure-11. Creating a questionnaire. Figure-14. planning result on admin pages. Figure-12. Publishing questionnaire. Figure-15. CISSP list standard. Testing of operational reports Tests conducted on election planning parameters, the addition of a custom planning, planning and record keeping. The test starts with the opening page of the menu operations through operations on the home page. Upon entry into the operational page, the user can select a link in the form of month and year format in accordance with the planning in the submit. The goal is for a review of the 1694

8 standard CISSP selected on the planning process. We can see the result start on Figure-17, Figure-18,to Figure-19. Tests on the results of standardized management CISSP In the software will be tested in the operational process proceeds by month and year of planning was made. Tests carried out on standard-making parameters CISSP, CISSP standard modification, and deletion of the CISSP standard. Tests on the results of standardized management CISSP In the software will be tested in the operational process proceeds by month and year of planning was made. Tests carried out on standard-making parameters CISSP, CISSP standard modification, and deletion of the CISSP standard. Figure-18. adding operational list detail. Figure-19. Downloadable report. The first step taken by the user is to login as the auditor as can be seen in Figure-20. Figure-16. Adding domain suggestion. Figure-20. Log in as an auditor. Figure-17. Operational testing. After auditors login, then the user will go to the main menu as an auditor as we can see in Figure

9 Figure-21. Auditor menu. After entering as an auditor, the user can choose to view the menu and edit standard CISSP domains of the CISSP. CISSP Domain menu, the user can see the description of the 10 domains of the CISSP. CISSP Domain menu at all access login as admin and guest. We can see it on Figure-22. Once users see what CISSP 10 Domains and description, users can perform on Standards CISSP management by selecting the Edit menu CISSP Standards. As we can see on Figure-23. we have been made a editable questionaire engine for Security Administrator so that it can be changed by the user or in a custom suit your needs. It takes a long time to make access to the database. The cause of this can be assumed from XAMPP localhost program that is not compatible with Windows 8, or due to use mysqli as the database programming language that led to slower access speeds as seen many case studies that use a MySQL database programming language gain access speed is much faster. There are similarities between the results of risk management stating risk in a high risk category to the CISSP standard on the operational part. The things that need to be considered by the Computer Center, is giving the password on the storage media (flash, portable hard drive), imposes limits on the user authentication fault tolerance, disaster evacuation drills Giving, Restrict access so that employees can not do indiscriminate access outside offices, and users rarely or never change the password periodically REFERENCES Conrad Eric Eleventh Hour CISSP Study Guide. Syngress, Danchev Dancho Building and Implementing a Successful Information Security Policy. Internet Software Marketing. Windows Security.com Dubois Paul MySQL (Developer Library) 5 ed. Addison-Wesley. Gomaa Hassan Software Modeling and Design: UML, Use Cases, Patterns, and Software Architectures. Cambridge University Press. Figure-22. CISSP 10 domain menu. Miller C Lawrence CISSP for dummies. For Dummies. Stoneburner Gary., Alice Goguen and Alexis Feringa Risk Management Guide for Information Technology System. NIST Special Publication rev1. Figure-23. CISSP standard edit menu. CONCLUSIONS Based on a system that has been developed and the results of the testing that has been done, we can conclude some of the following: 1696

New York Department of Financial Services Cybersecurity Regulation Compliance and Certification Deadlines

New York Department of Financial Services Cybersecurity Regulation Compliance and Certification Deadlines New York Department of Financial Services Cybersecurity Regulation Compliance and Certification Deadlines New York Department of Financial Services ( DFS ) Regulation 23 NYCRR 500 requires that entities

More information

TEL2813/IS2820 Security Management

TEL2813/IS2820 Security Management TEL2813/IS2820 Security Management Security Management Models And Practices Lecture 6 Jan 27, 2005 Introduction To create or maintain a secure environment 1. Design working security plan 2. Implement management

More information

Security Management Models And Practices Feb 5, 2008

Security Management Models And Practices Feb 5, 2008 TEL2813/IS2820 Security Management Security Management Models And Practices Feb 5, 2008 Objectives Overview basic standards and best practices Overview of ISO 17799 Overview of NIST SP documents related

More information

Information Technology General Control Review

Information Technology General Control Review Information Technology General Control Review David L. Shissler, Senior IT Auditor, CPA, CISA, CISSP Office of Internal Audit and Risk Assessment September 15, 2016 Background Presenter Senior IT Auditor

More information

E-guide CISSP Prep: 4 Steps to Achieve Your Certification

E-guide CISSP Prep: 4 Steps to Achieve Your Certification CISSP Prep: 4 Steps to Achieve Your Certification Practice for the exam and keep your skills sharp : Thank you for downloading our CISSP certification guide. Aside from this handy PDF, you can also access

More information

FRAMEWORK MAPPING HITRUST CSF V9 TO ISO 27001/27002:2013. Visit us online at Flank.org to learn more.

FRAMEWORK MAPPING HITRUST CSF V9 TO ISO 27001/27002:2013. Visit us online at Flank.org to learn more. FRAMEWORK MAPPING HITRUST CSF V9 TO ISO 27001/27002:2013 Visit us online at Flank.org to learn more. HITRUST CSF v9 Framework ISO 27001/27002:2013 Framework FLANK ISO 27001/27002:2013 Documentation from

More information

Course Outline. CISSP - Certified Information Systems Security Professional

Course Outline. CISSP - Certified Information Systems Security Professional Course Outline CISSP - Certified Information Systems Security 10 Jan 2019 Contents 1. Course Objective 2. Pre-Assessment 3. Exercises, Quizzes, Flashcards & Glossary Number of Questions 4. Expert Instructor-Led

More information

Standard for Security of Information Technology Resources

Standard for Security of Information Technology Resources MARSHALL UNIVERSITY INFORMATION TECHNOLOGY COUNCIL Standard ITP-44 Standard for Security of Information Technology Resources 1 General Information: Marshall University expects all individuals using information

More information

ISSP Network Security Plan

ISSP Network Security Plan ISSP-000 - Network Security Plan 1 CONTENTS 2 INTRODUCTION (Purpose and Intent)... 1 3 SCOPE... 2 4 STANDARD PROVISIONS... 2 5 STATEMENT OF PROCEDURES... 3 5.1 Network Control... 3 5.2 DHCP Services...

More information

HISPOL The United States House of Representatives Internet/ Intranet Security Policy. CATEGORY: Telecommunications Security

HISPOL The United States House of Representatives Internet/ Intranet Security Policy. CATEGORY: Telecommunications Security HISPOL 003.0 The United States House of Representatives Internet/ Intranet Security Policy CATEGORY: Telecommunications Security ISSUE DATE: February 4, 1998 REVISION DATE: August 23, 2000 The United States

More information

TARGET2-SECURITIES INFORMATION SECURITY REQUIREMENTS

TARGET2-SECURITIES INFORMATION SECURITY REQUIREMENTS Target2-Securities Project Team TARGET2-SECURITIES INFORMATION SECURITY REQUIREMENTS Reference: T2S-07-0270 Date: 09 October 2007 Version: 0.1 Status: Draft Target2-Securities - User s TABLE OF CONTENTS

More information

Virginia Commonwealth University School of Medicine Information Security Standard

Virginia Commonwealth University School of Medicine Information Security Standard Virginia Commonwealth University School of Medicine Information Security Standard Title: Scope: Personnel Security Standard This standard is applicable to all VCU School of Medicine personnel. Approval

More information

Subject: University Information Technology Resource Security Policy: OUTDATED

Subject: University Information Technology Resource Security Policy: OUTDATED Policy 1-18 Rev. 2 Date: September 7, 2006 Back to Index Subject: University Information Technology Resource Security Policy: I. PURPOSE II. University Information Technology Resources are at risk from

More information

EXAM PREPARATION GUIDE

EXAM PREPARATION GUIDE When Recognition Matters EXAM PREPARATION GUIDE PECB Certified Management System Auditor www.pecb.com The objective of the PECB Certified Management System Auditor examination is to ensure that the candidates

More information

Application for Certification

Application for Certification Application for Certification Requirements to Become a Certified Information Security Manager To become a Certified Information Security Manager (CISM), an applicant must: 1. Score a passing grade on the

More information

The Challenge of Cloud Security

The Challenge of Cloud Security The Challenge of Cloud Security Dr. Ray Klump Chair, Mathematics & Computer Science Director, MS in Information Security Lewis University Poll Question #1: What type of cloud service are you

More information

Trust Services Principles and Criteria

Trust Services Principles and Criteria Trust Services Principles and Criteria Security Principle and Criteria The security principle refers to the protection of the system from unauthorized access, both logical and physical. Limiting access

More information

Free Cissp Official Isc2 Practice Tests By Mike Chapple

Free Cissp Official Isc2 Practice Tests By Mike Chapple Free Cissp Official Isc2 Practice Tests By Mike Chapple Download: cissp-official-isc2-practice-tests-by-mikechapple.pdf Read: cissp official isc2 practice tests mike chapple Download & read cissp official

More information

ISC10D026. Report Control Information

ISC10D026. Report Control Information ISC10D026 Report Control Information Title: General Information Security Date: 28 January 2011 Version: v3.08 Reference: ICT/GISP/DRAFT/3.08 Authors: Steve Mosley Quality Assurance: ISSC Revision Date

More information

BUSINESS CONTINUITY MANAGEMENT PROGRAM OVERVIEW

BUSINESS CONTINUITY MANAGEMENT PROGRAM OVERVIEW BUSINESS CONTINUITY MANAGEMENT PROGRAM OVERVIEW EXECUTIVE SUMMARY CenturyLink is committed to ensuring business resiliency and survivability during an incident or business disruption. Our Corporate Business

More information

Position Description IT Auditor

Position Description IT Auditor Position Title IT Auditor Position Number Portfolio Performance and IT Audit Location Victoria Supervisor s Title IT Audit Director Travel Required Yes FOR OAG HR USE ONLY: Approved Classification or Leadership

More information

How Secure Do You Feel About Your HIPAA Compliance Plan? Daniel F. Shay, Esq.

How Secure Do You Feel About Your HIPAA Compliance Plan? Daniel F. Shay, Esq. How Secure Do You Feel About Your HIPAA Compliance Plan? Daniel F. Shay, Esq. Word Count: 2,268 Physician practices have lived with the reality of HIPAA for over twenty years. In that time, it has likely

More information

HOLY ANGEL UNIVERSITY COLLEGE OF INFORMATION AND COMMUNICATIONS TECHNOLOGY CYBER SECURITY COURSE SYLLABUS

HOLY ANGEL UNIVERSITY COLLEGE OF INFORMATION AND COMMUNICATIONS TECHNOLOGY CYBER SECURITY COURSE SYLLABUS HOLY ANGEL UNIVERSITY LLEGE OF INFORMATION AND MMUNICATIONS TECHNOLOGY CYBER SECURITY URSE SYLLABUS Course Code : 6CSEC Prerequisite : 6MPRO2L Course Credit : 3 Units (2 hours LEC,3 hours LAB) Year Level:

More information

K12 Cybersecurity Roadmap

K12 Cybersecurity Roadmap K12 Cybersecurity Roadmap Introduction Jason Brown, CISSP Chief Information Security Officer Merit Network, Inc jbrown@merit.edu @jasonbrown17 https://linkedin.com/in/jasonbrown17 2 Agenda 3 Why Use the

More information

Department of Public Health O F S A N F R A N C I S C O

Department of Public Health O F S A N F R A N C I S C O PAGE 1 of 7 Category: Information Technology Security and HIPAA DPH Unit of Origin: Department of Public Health Policy Owner: Phillip McDown, CISSP Phone: 255-3577 CISSPCISSP/C Distribution: DPH-wide Other:

More information

Annenberg Public Policy Center Sensitive National Annenberg Election Survey Data 1 Access: Application

Annenberg Public Policy Center Sensitive National Annenberg Election Survey Data 1 Access: Application Annenberg Public Policy Center Sensitive National Annenberg Election Survey Data 1 Access: Application The Investigator 2 must complete this application to request access to Sensitive NAES Data Set from

More information

Cyber Security Program

Cyber Security Program Cyber Security Program Cyber Security Program Goals and Objectives Goals Provide comprehensive Security Education and Awareness to the University community Build trust with the University community by

More information

Objectives of the Security Policy Project for the University of Cyprus

Objectives of the Security Policy Project for the University of Cyprus Objectives of the Security Policy Project for the University of Cyprus 1. Introduction 1.1. Objective The University of Cyprus intends to upgrade its Internet/Intranet security architecture. The University

More information

Business Continuity Management Standards A Side-by-Side Comparison

Business Continuity Management Standards A Side-by-Side Comparison Business Continuity Standards A Side-by-Side Comparison By Brian Zawada (CBCP) & Jared Schwartz (CBCP) Whether your organization has begun a grassroots initiative to develop a business continuity plan

More information

SECURITY & PRIVACY DOCUMENTATION

SECURITY & PRIVACY DOCUMENTATION Okta s Commitment to Security & Privacy SECURITY & PRIVACY DOCUMENTATION (last updated September 15, 2017) Okta is committed to achieving and preserving the trust of our customers, by providing a comprehensive

More information

A company built on security

A company built on security Security How we handle security at Flywheel Flywheel was founded in 2012 on a mission to create an exceptional platform to help creatives do their best work. As the leading WordPress hosting provider for

More information

Texas A&M University: Learning Management System General & Application Controls Review

Texas A&M University: Learning Management System General & Application Controls Review Overall Conclusion Overall, the controls established over the primary learning management system at Texas A&M University, Blackboard Learn (ecampus), are effective in providing reasonable assurance that

More information

FOUNDATION CERTIFICATE IN INFORMATION SECURITY v2.0 INTRODUCING THE TOP 5 DISCIPLINES IN INFORMATION SECURITY SUMMARY

FOUNDATION CERTIFICATE IN INFORMATION SECURITY v2.0 INTRODUCING THE TOP 5 DISCIPLINES IN INFORMATION SECURITY SUMMARY FOUNDATION CERTIFICATE IN INFORMATION SECURITY v2.0 INTRODUCING THE TOP 5 DISCIPLINES IN INFORMATION SECURITY SUMMARY The Foundation Certificate in Information Security (FCIS) course is designed to provide

More information

HITRUST CSF Assurance Program HITRUST, Frisco, TX. All Rights Reserved.

HITRUST CSF Assurance Program HITRUST, Frisco, TX. All Rights Reserved. HITRUST CSF Assurance Program HITRUST CSF Assurance Program The Need Organizations facing multiple and varied assurance requirements from a variety of parties Increasing pressure and penalties associated

More information

Certified information Systems Security Professional(CISSP) Bootcamp

Certified information Systems Security Professional(CISSP) Bootcamp Certified information Systems Security Professional(CISSP) Bootcamp Length: 5 days Format: Bootcamp Time: Day About This Course Official CISSP training draws from a comprehensive, up-to-date, global common

More information

University of Pittsburgh Security Assessment Questionnaire (v1.7)

University of Pittsburgh Security Assessment Questionnaire (v1.7) Technology Help Desk 412 624-HELP [4357] technology.pitt.edu University of Pittsburgh Security Assessment Questionnaire (v1.7) Directions and Instructions for completing this assessment The answers provided

More information

POLICY FOR DATA AND INFORMATION SECURITY AT BMC IN LUND. October Table of Contents

POLICY FOR DATA AND INFORMATION SECURITY AT BMC IN LUND. October Table of Contents POLICY FOR DATA AND INFORMATION SECURITY AT BMC IN LUND October 2005 Table of Contents Introduction... 1 Purpose Of This Policy... 1 Responsibility... 1 General Policy... 2 Data Classification Policy...

More information

emarketeer Information Security Policy

emarketeer Information Security Policy emarketeer Information Security Policy Version Date 1.1 2018-05-03 emarketeer Information Security Policy emarketeer AB hereafter called emarketeer is a leading actor within the development of SaaS-service

More information

Advisory Circular. Subject: INTERNET COMMUNICATIONS OF Date: 11/1/02 AC No.: AVIATION WEATHER AND NOTAMS Initiated by: ARS-100

Advisory Circular. Subject: INTERNET COMMUNICATIONS OF Date: 11/1/02 AC No.: AVIATION WEATHER AND NOTAMS Initiated by: ARS-100 U.S. Department of Transportation Federal Aviation Administration Advisory Circular Subject: INTERNET COMMUNICATIONS OF Date: 11/1/02 AC No.: 00-62 AVIATION WEATHER AND NOTAMS Initiated by: ARS-100 1.

More information

2015 HFMA What Healthcare Can Learn from the Banking Industry

2015 HFMA What Healthcare Can Learn from the Banking Industry 2015 HFMA What Healthcare Can Learn from the Banking Industry Agenda Introduction- Background and Experience Healthcare vs. Banking The Results OCR Audit Results Healthcare vs. Banking The Theories Practical

More information

Plenary Session: Branch Cybersecurity Controls Thursday, February 22 1:15 p.m. 2:15 p.m.

Plenary Session: Branch Cybersecurity Controls Thursday, February 22 1:15 p.m. 2:15 p.m. Plenary Session: Branch Cybersecurity Controls Thursday, February 22 1:15 p.m. 2:15 p.m. Cybersecurity is a top priority for the financial services industry. Firms dedicate significant resources every

More information

INTELLIGENCE DRIVEN GRC FOR SECURITY

INTELLIGENCE DRIVEN GRC FOR SECURITY INTELLIGENCE DRIVEN GRC FOR SECURITY OVERVIEW Organizations today strive to keep their business and technology infrastructure organized, controllable, and understandable, not only to have the ability to

More information

STRATEGIC PLAN. USF Emergency Management

STRATEGIC PLAN. USF Emergency Management 2016-2020 STRATEGIC PLAN USF Emergency Management This page intentionally left blank. Organization Overview The Department of Emergency Management (EM) is a USF System-wide function based out of the Tampa

More information

General Information Technology Controls Follow-up Review

General Information Technology Controls Follow-up Review Office of Internal Audit General Information Technology Controls Follow-up Review May 19, 2015 Internal Audit Team Shannon B. Henry Chief Audit Executive Stacy Sneed Audit Manager Rod Isom Auditor Winston-Salem

More information

Checklist: Credit Union Information Security and Privacy Policies

Checklist: Credit Union Information Security and Privacy Policies Checklist: Credit Union Information Security and Privacy Policies Acceptable Use Access Control and Password Management Background Check Backup and Recovery Bank Secrecy Act/Anti-Money Laundering/OFAC

More information

Altius IT Policy Collection

Altius IT Policy Collection Altius IT Policy Collection Complete set of cyber and network security policies Over 100 Policies, Plans, and Forms Fully customizable - fully customizable IT security policies in Microsoft Word No software

More information

EXAM PREPARATION GUIDE

EXAM PREPARATION GUIDE EXAM PREPARATION GUIDE PECB Certified ISO 50001 Lead Auditor The objective of the PECB Certified ISO 50001 Lead Auditor examination is to ensure that the candidate has the knowledge and skills to plan

More information

WELCOME ISO/IEC 27001:2017 Information Briefing

WELCOME ISO/IEC 27001:2017 Information Briefing WELCOME ISO/IEC 27001:2017 Information Briefing Denis Ryan C.I.S.S.P NSAI Lead Auditor Running Order 1. Market survey 2. Why ISO 27001 3. Requirements of ISO 27001 4. Annex A 5. Registration process 6.

More information

A Security Risk Analysis Model for Information Systems

A Security Risk Analysis Model for Information Systems A Security Risk Analysis Model for Information Systems Hoh Peter In 1,*, Young-Gab Kim 1, Taek Lee 1, Chang-Joo Moon 2, Yoonjung Jung 3, and Injung Kim 3 1 Department of Computer Science and Engineering,

More information

IJESRT. (I2OR), Publication Impact Factor: (ISRA), Impact Factor: 2.114

IJESRT. (I2OR), Publication Impact Factor: (ISRA), Impact Factor: 2.114 IJESRT INTERNATIONAL JOURNAL OF ENGINEERING SCIENCES & RESEARCH TECHNOLOGY EVALUATING ISO STANDARDS APPLICATION OF SECURITY REQUIREMENTS OF E- BANKING IN SUDAN Inshirah M. O. Elmaghrabi*, Hoida A. Abdelgadir,

More information

The Common Controls Framework BY ADOBE

The Common Controls Framework BY ADOBE The Controls Framework BY ADOBE The following table contains the baseline security subset of control activities (derived from the Controls Framework by Adobe) that apply to Adobe s enterprise offerings.

More information

Certified Information Security Manager (CISM) Course Overview

Certified Information Security Manager (CISM) Course Overview Certified Information Security Manager (CISM) Course Overview This course teaches students about information security governance, information risk management, information security program development,

More information

Electronic Signature Policy

Electronic Signature Policy Electronic Signature Policy Definitions The following terms are used in this policy. Term Definition Electronic Signature An electronic signature is a paperless method used to authorize or approve documents

More information

The HITRUST CSF. A Revolutionary Way to Protect Electronic Health Information

The HITRUST CSF. A Revolutionary Way to Protect Electronic Health Information The HITRUST CSF A Revolutionary Way to Protect Electronic Health Information June 2015 The HITRUST CSF 2 Organizations in the healthcare industry are under immense pressure to improve quality, reduce complexity,

More information

BUILDING CYBERSECURITY CAPABILITY, MATURITY, RESILIENCE

BUILDING CYBERSECURITY CAPABILITY, MATURITY, RESILIENCE BUILDING CYBERSECURITY CAPABILITY, MATURITY, RESILIENCE 1 WHAT IS YOUR SITUATION? Excel spreadsheets Manually intensive Too many competing priorities Lack of effective reporting Too many consultants Not

More information

HUMANITARIAN COORDINATION TRAINING. Safety & Security in Humanitarian Coordination

HUMANITARIAN COORDINATION TRAINING. Safety & Security in Humanitarian Coordination HUMANITARIAN COORDINATION TRAINING Safety & Security in Humanitarian Coordination Pre-Departure Security Considerations Make appointment for pre-departure security briefing with your organization Research

More information

Network Security

Network Security 44-555 Network Security Instructor: Scott Bell Office: 2220 Colden Hall Email: sbell@nwmissouri.edu Phone: (660) 562-1699 Description: An introduction to the fundamentals of network security, including

More information

NEW YORK CYBERSECURITY REGULATION COMPLIANCE GUIDE

NEW YORK CYBERSECURITY REGULATION COMPLIANCE GUIDE COMPLIANCE ADVISOR NEW YORK CYBERSECURITY REGULATION COMPLIANCE GUIDE A PUBLICATION BY THE EXCESS LINE ASSOCIATION OF NEW YORK One Exchange Plaza 55 Broadway 29th Floor New York, New York 10006-3728 Telephone:

More information

June 2012 First Data PCI RAPID COMPLY SM Solution

June 2012 First Data PCI RAPID COMPLY SM Solution June 2012 First Data PCI RAPID COMPLY SM Solution You don t have to be a security expert to be compliant. Developer: 06 Rev: 05/03/2012 V: 1.0 Agenda Research Background Product Overview Steps to becoming

More information

ALABAMA FIRE COLLEGE SKILLS EVALUATOR TRAINING

ALABAMA FIRE COLLEGE SKILLS EVALUATOR TRAINING ALABAMA FIRE COLLEGE SKILLS EVALUATOR TRAINING Revised: November 27, 2015 OUR TRAINING OBJECTIVES The objectives for this training: Define certification, accreditation, and testing Define skills evaluator

More information

AUTHORITY FOR ELECTRICITY REGULATION

AUTHORITY FOR ELECTRICITY REGULATION SULTANATE OF OMAN AUTHORITY FOR ELECTRICITY REGULATION SCADA AND DCS CYBER SECURITY STANDARD FIRST EDITION AUGUST 2015 i Contents 1. Introduction... 1 2. Definitions... 1 3. Baseline Mandatory Requirements...

More information

Shon Harris s Newly Updated CISSP Materials

Shon Harris s Newly Updated CISSP Materials Shon Harris s Newly Updated CISSP Materials WHY PURSUE A CISSP? Many companies are beginning to regard a CISSP certification as a requirement for their technical, mid-management, and senior IT management

More information

Security Standards for Electric Market Participants

Security Standards for Electric Market Participants Security Standards for Electric Market Participants PURPOSE Wholesale electric grid operations are highly interdependent, and a failure of one part of the generation, transmission or grid management system

More information

Red Flags/Identity Theft Prevention Policy: Purpose

Red Flags/Identity Theft Prevention Policy: Purpose Red Flags/Identity Theft Prevention Policy: 200.3 Purpose Employees and students depend on Morehouse College ( Morehouse ) to properly protect their personal non-public information, which is gathered and

More information

EXAM PREPARATION GUIDE

EXAM PREPARATION GUIDE When Recognition Matters EXAM PREPARATION GUIDE PECB Certified ISO 14001 Lead Auditor www.pecb.com The objective of the PECB Certified ISO 14001 Lead Auditor examination is to ensure that the candidate

More information

Information Systems and Tech (IST)

Information Systems and Tech (IST) Information Systems and Tech (IST) 1 Information Systems and Tech (IST) Courses IST 101. Introduction to Information Technology. 4 Introduction to information technology concepts and skills. Survey of

More information

How to Conduct a Business Impact Analysis and Risk Assessment

How to Conduct a Business Impact Analysis and Risk Assessment How to Conduct a Business Impact Analysis and Risk Assessment By Larry Pedrazoli Business Recovery Analyst Miller Brewing Company February 2006 Project Management Institute, La Crosse, WI Chapter Agenda

More information

Parent Handbook: Campus Portal Account Activation

Parent Handbook: Campus Portal Account Activation Parent Handbook: Campus Portal Account Activation Table of Contents Introduction... 1 FOR PARENTS... 1 Parent receives an email with a link... 2 Campus Security Features... 5 If You Forget Your Password

More information

Business Continuity Management Program Overview

Business Continuity Management Program Overview Business Continuity Management Program Overview Improving the lives of our customers by connecting them to the power of the digital world CenturyLink Key Objective CenturyLink may modify or terminate this

More information

UTAH VALLEY UNIVERSITY Policies and Procedures

UTAH VALLEY UNIVERSITY Policies and Procedures Page 1 of 5 POLICY TITLE Section Subsection Responsible Office Private Sensitive Information Facilities, Operations, and Information Technology Information Technology Office of the Vice President of Information

More information

security FRAUD PREVENTION Business Checklist Safeguard your money, your credit and your good name.

security FRAUD PREVENTION Business Checklist Safeguard your money, your credit and your good name. security FRAUD PREVENTION Business Checklist Safeguard your money, your credit and your good name. Security for Your Business Mitigating risk is a daily reality for business owners, but you don t have

More information

Sparta Systems TrackWise Digital Solution

Sparta Systems TrackWise Digital Solution Systems TrackWise Digital Solution 21 CFR Part 11 and Annex 11 Assessment February 2018 Systems TrackWise Digital Solution Introduction The purpose of this document is to outline the roles and responsibilities

More information

CPM Certification Examination

CPM Certification Examination CPM Certification Examination Preparation and Registration Information REAL ESTATE INSTITUTE of CANADA Institut canadien de l immeuble 5407 Eglinton Avenue West, Suite 208 Toronto ON M9C 5K6 Introduction

More information

Certification Candidate Handbook

Certification Candidate Handbook Certification Candidate Handbook The Certification Candidate Management System (CCMS) User Guide details the process from beginning to end, program requirements, what to expect at the testing center, how

More information

Kenna Platform Security. A technical overview of the comprehensive security measures Kenna uses to protect your data

Kenna Platform Security. A technical overview of the comprehensive security measures Kenna uses to protect your data Kenna Platform Security A technical overview of the comprehensive security measures Kenna uses to protect your data V3.0, MAY 2017 Multiple Layers of Protection Overview Password Salted-Hash Thank you

More information

EXAM PREPARATION GUIDE

EXAM PREPARATION GUIDE When Recognition Matters EXAM PREPARATION GUIDE PECB Certified ISO 14001 Lead Implementer www.pecb.com The objective of the PECB Certified ISO 14001 Lead Implementer examination is to ensure that the candidate

More information

Data Protection. Plugging the gap. Gary Comiskey 26 February 2010

Data Protection. Plugging the gap. Gary Comiskey 26 February 2010 Data Protection. Plugging the gap Gary Comiskey 26 February 2010 Data Protection Trends in Financial Services Financial services firms are deploying data protection solutions across their enterprise at

More information

ORA HIPAA Security. All Affiliate Research Policy Subject: HIPAA Security File Under: For Researchers

ORA HIPAA Security. All Affiliate Research Policy Subject: HIPAA Security File Under: For Researchers All Affiliate Research Policy Subject: HIPAA File Under: For Researchers ORA HIPAA Issuing Department: Office of Research Administration Original Policy Date Page 1 of 5 Approved by: May 9,2005 Revision

More information

"Charting the Course... Certified Information Systems Auditor (CISA) Course Summary

Charting the Course... Certified Information Systems Auditor (CISA) Course Summary Course Summary Description In this course, you will perform evaluations of organizational policies, procedures, and processes to ensure that an organization's information systems align with overall business

More information

Information Technology Security Plan Policies, Controls, and Procedures Identify Governance ID.GV

Information Technology Security Plan Policies, Controls, and Procedures Identify Governance ID.GV Information Technology Security Plan Policies, Controls, and Procedures Identify Governance ID.GV Location: https://www.pdsimplified.com/ndcbf_pdframework/nist_csf_prc/documents/identify/ndcbf _ITSecPlan_IDGV2017.pdf

More information

Projectplace: A Secure Project Collaboration Solution

Projectplace: A Secure Project Collaboration Solution Solution brief Projectplace: A Secure Project Collaboration Solution The security of your information is as critical as your business is dynamic. That s why we built Projectplace on a foundation of the

More information

NYDFS Cybersecurity Regulations

NYDFS Cybersecurity Regulations SPEAKERS NYDFS Cybersecurity Regulations Lisa J. Sotto Hunton & Williams LLP (212) 309-1223 lsotto@hunton.com www.huntonprivacyblog.com March 9, 2017 The Privacy Team at Hunton & Williams Over 30 privacy

More information

Threat and Vulnerability Assessment Tool

Threat and Vulnerability Assessment Tool TABLE OF CONTENTS Threat & Vulnerability Assessment Process... 3 Purpose... 4 Components of a Threat & Vulnerability Assessment... 4 Administrative Safeguards... 4 Logical Safeguards... 4 Physical Safeguards...

More information

Information Security Controls Policy

Information Security Controls Policy Information Security Controls Policy Version 1 Version: 1 Dated: 21 May 2018 Document Owner: Head of IT Security and Compliance Document History and Reviews Version Date Revision Author Summary of Changes

More information

Making YOUR Organization More Efficient and Effective Through Business Continuity / Continuity of Operations Planning

Making YOUR Organization More Efficient and Effective Through Business Continuity / Continuity of Operations Planning 2017 California Higher Education Collaborative Conference Making YOUR Organization More Efficient and Effective Through Business Continuity / Continuity of Operations Planning Introductions Rick Blackburn,

More information

WHY BUILDING SECURITY SYSTEMS NEED CONTINUOUS AVAILABILITY

WHY BUILDING SECURITY SYSTEMS NEED CONTINUOUS AVAILABILITY WHY BUILDING SECURITY SYSTEMS NEED CONTINUOUS AVAILABILITY White Paper 2 Why Building Security Systems Need Continuous Availability Always On Is the Only Option. If All Systems Go Down, How Can You React

More information

ROLE DESCRIPTION IT SPECIALIST

ROLE DESCRIPTION IT SPECIALIST ROLE DESCRIPTION IT SPECIALIST JOB IDENTIFICATION Job Title: Job Grade: Department: Location Reporting Line (This structure reports to?) Full-time/Part-time/Contract: IT Specialist D1 Finance INSETA Head

More information

existing customer base (commercial and guidance and directives and all Federal regulations as federal)

existing customer base (commercial and guidance and directives and all Federal regulations as federal) ATTACHMENT 7 BSS RISK MANAGEMENT FRAMEWORK PLAN [L.30.2.7, M.2.2.(7), G.5.6; F.2.1(41) THROUGH (76)] A7.1 BSS SECURITY REQUIREMENTS Our Business Support Systems (BSS) Risk MetTel ensures the security of

More information

GUIDELINES FOR SUBMITTING CONTINUING PROFESSIONAL EDUCATION (CPE) CREDITS

GUIDELINES FOR SUBMITTING CONTINUING PROFESSIONAL EDUCATION (CPE) CREDITS GUIDELINES FOR SUBMITTING CONTINUING PROFESSIONAL EDUCATION (CPE) CREDITS (ISC) 2 CISSP Recertification Guidelines (rev. 8-06) Page 1 of 16 CONTENTS Introduction... 3 CPE Record Keeping... 4 CPE Credit

More information

Cyber Security. February 13, 2018 (webinar) February 15, 2018 (in-person)

Cyber Security. February 13, 2018 (webinar) February 15, 2018 (in-person) Cyber Security Presenters: - Brian Everest, Chief Technology Officer, Starport Managed Services - Susan Pawelek, Accountant, Compliance and Registrant Regulation February 13, 2018 (webinar) February 15,

More information

The GenCyber Program. By Chris Ralph

The GenCyber Program. By Chris Ralph The GenCyber Program By Chris Ralph The Mission of GenCyber Provide a cybersecurity camp experience for students and teachers at the K-12 level. The primary goal of the program is to increase interest

More information

CCISO Blueprint v1. EC-Council

CCISO Blueprint v1. EC-Council CCISO Blueprint v1 EC-Council Categories Topics Covered Weightage 1. Governance (Policy, Legal, & Compliance) & Risk Management 1.1 Define, implement, manage and maintain an information security governance

More information

Information Technology Standards

Information Technology Standards Information Technology Standards IT Standard Issued: 9/16/2009 Supersedes: New Standard Mobile Device Security Responsible Executive: HSC CIO Responsible Office: HSC IT Contact: For questions about this

More information

Pearson CISSP Cert Guide with Labs. Course Outline. Pearson CISSP Cert Guide with Labs. 17 Oct

Pearson CISSP Cert Guide with Labs. Course Outline. Pearson CISSP Cert Guide with Labs. 17 Oct Course Outline Pearson CISSP Cert Guide with Labs 17 Oct 2018 Contents 1. Course Objective 2. Pre-Assessment 3. Exercises, Quizzes, Flashcards & Glossary Number of Questions 4. Expert Instructor-Led Training

More information

Information Security Policy

Information Security Policy Document title: [ Information Security Policy May 2017 ] Approval date: [ May 2017 ] Purpose of document: [ To define AUC s information security program main pillars and components] Office/department responsible:

More information

Development Authority of the North Country Governance Policies

Development Authority of the North Country Governance Policies Development Authority of the North Country Governance Policies Subject: Electronic Signature Policy Adopted: March 28, 2018 (Annual Meeting) Resolution: 2018-03-35 Table of Contents SECTION 1.0 INTRODUCTION...

More information

Password Standard Version 2.0 October 2006

Password Standard Version 2.0 October 2006 Password Standard Version 2.0 October 2006 TABLE OF CONTENTS 1.1 SCOPE 2 1.2 PRINCIPLES 2 1.3 REVISIONS 3 2.1 OBJECTIVE 4 3.1 POLICY 4 3.2 PROTECTION 4 3.3 LENGTH 4 3.4 SELECTIONS 4 3.5 EXPIRATION 5 3.6

More information

Information Security Policy

Information Security Policy April 2016 Table of Contents PURPOSE AND SCOPE 5 I. CONFIDENTIAL INFORMATION 5 II. SCOPE 6 ORGANIZATION OF INFORMATION SECURITY 6 I. RESPONSIBILITY FOR INFORMATION SECURITY 6 II. COMMUNICATIONS REGARDING

More information

Florida Government Finance Officers Association. Staying Secure when Transforming to a Digital Government

Florida Government Finance Officers Association. Staying Secure when Transforming to a Digital Government Florida Government Finance Officers Association Staying Secure when Transforming to a Digital Government Agenda Plante Moran Introductions Technology Pressures and Challenges Facing Government Technology

More information

Third Party Security Review Process

Third Party Security Review Process Third Party Security Review Process Rev. 10/11/2016 OIT/IPS-Information Security Office Version Control Version Date Name Change 1.0 9/26/16 V. Guerrero First version of the document 1.2 10/11/16 S. Foote

More information